How you lock your computer?
Like this? ~~~~~~~~~~~~~~~~~~>
Do you aware of computer viruses?
What kind of threats are there?
Like this? ~~~~~~~~~~~~~~~~~~>
Do you aware of computer viruses?
What kind of threats are there?
Nowadays, organizations are always facing cyber attacks from inside and outside of the organization, it is a huge number of cyber attacks happening day to day. According to Secure Works, the number of attempted hacks rose from 11,146 per health care client per day in the first half of 2007 to almost 20,630 per day in the second half of 2007 in January 2008. Besides organization, even individual computer users are facing the Internet threats and attacks. There are 2 categories of threats and attacks, nontechnical attack and technical attack.
Nontechnical attack:
It is where the attackers do some action that compromise the security of a network or use their intelligent and chicanery to trick people to get their personal information such as password, credit card numbers, and other sensitive information. One of the type of nontechnical is social engineering - which is the hacker uses the social pressures to trick computer users, such as cheating people for gain the financial transaction. Other than that, Phishing also is a type of the nontechnical attack. For further Phishing information, please click here.
Technical attack:
Technical attack:
Denial-of-service (DoS) attack
DoS or distributed Dos attack is where the attacker uses particular software to send a flood of data packets to the victim (computer) in the purpose to make its resources unavailable to its intended user. There are various types DoS attack, the 5 basic types of DoS attack are consumption of computational resources, Disruption of configuration information, Disruption of state information, Disruption of physical network components, and obstructing the communication media between the intended users and the victim so that they can no longer communicate
adequately.Spyware
It is also called adware, which is a software that is hiding in your computer for the purposes of gather your personal information and Internet use habits. After that, software then relays it to advertisers, marketing groups and others who use the information to target you with pop-up ads. It is similar to computer virus, it can cause the computer become slow down or hang up. Further more, it will also cause conflicts between different software program, add new toolbars in the Web browser, change the Web browser's homepage, slow down network speed, and etc. The examples of Spyware are CoolWebSearch, Internet Optimizer, Zango, HuntBar, Zlob Trojan and so on. For more detailed information, please click here.
Virus
Virus is a software code that replicates itself and infects another file, program, partition sector, boot sector, or a document with executable instructions (such as macros) by attaching itself or inserting itself into that medium. It needs its host program to be run in order to activate it, so it won't cause damage when the computer turned off. Majority viruses are just replicate and do little more, but there are some viruses that can cause a significant amount of damage. There are many type of viruses, such as Resident Viruses, Direct Action Viruses, Overwrite Viruses, Boot Virus, Macro Virus, Directory Virus, and etc.
Worm
A computer worm is a computer program that runs independently. It will send copies of itself to other computers through the network and without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer. It can damage the computer data even the computer is not running once the computer is infected. As compare with viruses, worm cause the damage more slowly.
Worm
A computer worm is a computer program that runs independently. It will send copies of itself to other computers through the network and without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer. It can damage the computer data even the computer is not running once the computer is infected. As compare with viruses, worm cause the damage more slowly.
Trojan Horse
It is a term used to describe malware - which is a program that appears to have a useful function but, in fact, it contains a hidden function that gain unauthorized access to the user's computer system. The name of 'Trojan Horse' is came from the story in Greek mythology. Trojan horses are not self-replicating which distinguishes them from viruses and worms. Additionally, they require interaction with a hacker to fulfill their purpose.
As we always say 'prevention is better than cure', instead of worry and cure the computer system after infected viruses, better prevent it by install anti-virus in the computer system and be more careful when access to the Internet and the time when received unauthorized email. From my experience, better not click on the pop-up from the Web site and ignore those email sent from unauthorized people. For getting a free anti-virus, visit http://free.avg.com/.
Referencing:http://en.wikipedia.org/wiki/Main_Page
http://doit.missouri.edu/security/make-it-safe/spyware-phishing.html
http://www.yourdictionary.com/hacker/types-of-threats
http://ezinearticles.com/?Examples-Of-Spyware-And-What-They-Are&id=1054106
http://www.buzzle.com/articles/different-types-of-computer-viruses.html
No comments:
Post a Comment